{"url":"http://public2.vulnerablecode.io/api/packages/78206?format=json","purl":"pkg:ebuild/net-analyzer/ethereal@0.99.0-r1","type":"ebuild","namespace":"net-analyzer","name":"ethereal","version":"0.99.0-r1","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"0.99.2","latest_non_vulnerable_version":"0.99.2","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50376?format=json","vulnerability_id":"VCID-2jvn-7b8q-jqa7","summary":"Wireshark (formerly known as Ethereal) is vulnerable to several security\n    issues, potentially allowing the execution of arbitrary code by a remote\n    attacker.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3627.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3627.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3627","reference_id":"","reference_type":"","scores":[{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84289","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84302","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84321","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84323","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84345","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.8435","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84368","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84361","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84357","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84379","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84383","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84409","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84417","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84422","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3627"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3627","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3627"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618146","reference_id":"1618146","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618146"},{"reference_url":"https://security.gentoo.org/glsa/200607-09","reference_id":"GLSA-200607-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200607-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0602","reference_id":"RHSA-2006:0602","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0602"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78207?format=json","purl":"pkg:ebuild/net-analyzer/ethereal@0.99.2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/ethereal@0.99.2"}],"aliases":["CVE-2006-3627"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2jvn-7b8q-jqa7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50378?format=json","vulnerability_id":"VCID-4skf-mawd-r3hx","summary":"Wireshark (formerly known as Ethereal) is vulnerable to several security\n    issues, potentially allowing the execution of arbitrary code by a remote\n    attacker.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3628.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3628.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3628","reference_id":"","reference_type":"","scores":[{"value":"0.05887","scoring_system":"epss","scoring_elements":"0.90536","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05887","scoring_system":"epss","scoring_elements":"0.90541","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05887","scoring_system":"epss","scoring_elements":"0.90551","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05887","scoring_system":"epss","scoring_elements":"0.90559","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05887","scoring_system":"epss","scoring_elements":"0.90571","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05887","scoring_system":"epss","scoring_elements":"0.90577","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05887","scoring_system":"epss","scoring_elements":"0.90586","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05887","scoring_system":"epss","scoring_elements":"0.9058","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05887","scoring_system":"epss","scoring_elements":"0.90598","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05887","scoring_system":"epss","scoring_elements":"0.90597","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05887","scoring_system":"epss","scoring_elements":"0.90595","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05887","scoring_system":"epss","scoring_elements":"0.9061","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05887","scoring_system":"epss","scoring_elements":"0.90611","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05887","scoring_system":"epss","scoring_elements":"0.90607","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3628"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618147","reference_id":"1618147","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618147"},{"reference_url":"https://security.gentoo.org/glsa/200607-09","reference_id":"GLSA-200607-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200607-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0602","reference_id":"RHSA-2006:0602","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0602"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78207?format=json","purl":"pkg:ebuild/net-analyzer/ethereal@0.99.2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/ethereal@0.99.2"}],"aliases":["CVE-2006-3628"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4skf-mawd-r3hx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50382?format=json","vulnerability_id":"VCID-amtm-3j6n-gkag","summary":"Wireshark (formerly known as Ethereal) is vulnerable to several security\n    issues, potentially allowing the execution of arbitrary code by a remote\n    attacker.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3632.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3632.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3632","reference_id":"","reference_type":"","scores":[{"value":"0.0501","scoring_system":"epss","scoring_elements":"0.89679","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0501","scoring_system":"epss","scoring_elements":"0.89682","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0501","scoring_system":"epss","scoring_elements":"0.89696","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0501","scoring_system":"epss","scoring_elements":"0.89698","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0501","scoring_system":"epss","scoring_elements":"0.89715","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0501","scoring_system":"epss","scoring_elements":"0.89722","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0501","scoring_system":"epss","scoring_elements":"0.89729","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0501","scoring_system":"epss","scoring_elements":"0.89727","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0501","scoring_system":"epss","scoring_elements":"0.89721","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0501","scoring_system":"epss","scoring_elements":"0.89737","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0501","scoring_system":"epss","scoring_elements":"0.89733","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0501","scoring_system":"epss","scoring_elements":"0.89747","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0501","scoring_system":"epss","scoring_elements":"0.89749","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0501","scoring_system":"epss","scoring_elements":"0.89748","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3632"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3632","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3632"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618151","reference_id":"1618151","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618151"},{"reference_url":"https://security.gentoo.org/glsa/200607-09","reference_id":"GLSA-200607-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200607-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0602","reference_id":"RHSA-2006:0602","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0602"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78207?format=json","purl":"pkg:ebuild/net-analyzer/ethereal@0.99.2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/ethereal@0.99.2"}],"aliases":["CVE-2006-3632"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-amtm-3j6n-gkag"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50379?format=json","vulnerability_id":"VCID-k5km-1qar-t3e2","summary":"Wireshark (formerly known as Ethereal) is vulnerable to several security\n    issues, potentially allowing the execution of arbitrary code by a remote\n    attacker.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3629.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3629.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3629","reference_id":"","reference_type":"","scores":[{"value":"0.1052","scoring_system":"epss","scoring_elements":"0.93232","published_at":"2026-04-01T12:55:00Z"},{"value":"0.1052","scoring_system":"epss","scoring_elements":"0.93241","published_at":"2026-04-02T12:55:00Z"},{"value":"0.1052","scoring_system":"epss","scoring_elements":"0.93246","published_at":"2026-04-04T12:55:00Z"},{"value":"0.1052","scoring_system":"epss","scoring_elements":"0.93244","published_at":"2026-04-07T12:55:00Z"},{"value":"0.1052","scoring_system":"epss","scoring_elements":"0.93253","published_at":"2026-04-08T12:55:00Z"},{"value":"0.1052","scoring_system":"epss","scoring_elements":"0.93257","published_at":"2026-04-09T12:55:00Z"},{"value":"0.1052","scoring_system":"epss","scoring_elements":"0.9326","published_at":"2026-04-13T12:55:00Z"},{"value":"0.1052","scoring_system":"epss","scoring_elements":"0.93258","published_at":"2026-04-12T12:55:00Z"},{"value":"0.1052","scoring_system":"epss","scoring_elements":"0.93277","published_at":"2026-04-16T12:55:00Z"},{"value":"0.1052","scoring_system":"epss","scoring_elements":"0.93282","published_at":"2026-04-18T12:55:00Z"},{"value":"0.1052","scoring_system":"epss","scoring_elements":"0.93289","published_at":"2026-04-21T12:55:00Z"},{"value":"0.1052","scoring_system":"epss","scoring_elements":"0.93295","published_at":"2026-04-24T12:55:00Z"},{"value":"0.1052","scoring_system":"epss","scoring_elements":"0.93292","published_at":"2026-04-26T12:55:00Z"},{"value":"0.1052","scoring_system":"epss","scoring_elements":"0.93288","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3629"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618148","reference_id":"1618148","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618148"},{"reference_url":"https://security.gentoo.org/glsa/200607-09","reference_id":"GLSA-200607-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200607-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0602","reference_id":"RHSA-2006:0602","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0602"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78207?format=json","purl":"pkg:ebuild/net-analyzer/ethereal@0.99.2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/ethereal@0.99.2"}],"aliases":["CVE-2006-3629"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k5km-1qar-t3e2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50380?format=json","vulnerability_id":"VCID-mjse-ctbf-4yhk","summary":"Wireshark (formerly known as Ethereal) is vulnerable to several security\n    issues, potentially allowing the execution of arbitrary code by a remote\n    attacker.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3630.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3630.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3630","reference_id":"","reference_type":"","scores":[{"value":"0.01265","scoring_system":"epss","scoring_elements":"0.79404","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01265","scoring_system":"epss","scoring_elements":"0.79411","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01265","scoring_system":"epss","scoring_elements":"0.79434","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01265","scoring_system":"epss","scoring_elements":"0.79421","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01265","scoring_system":"epss","scoring_elements":"0.79448","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01265","scoring_system":"epss","scoring_elements":"0.79457","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01265","scoring_system":"epss","scoring_elements":"0.79479","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01265","scoring_system":"epss","scoring_elements":"0.79462","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01265","scoring_system":"epss","scoring_elements":"0.79452","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01265","scoring_system":"epss","scoring_elements":"0.79482","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01265","scoring_system":"epss","scoring_elements":"0.7948","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01265","scoring_system":"epss","scoring_elements":"0.79483","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01265","scoring_system":"epss","scoring_elements":"0.79515","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01265","scoring_system":"epss","scoring_elements":"0.79522","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01265","scoring_system":"epss","scoring_elements":"0.79537","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3630"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3630","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3630"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618149","reference_id":"1618149","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618149"},{"reference_url":"https://security.gentoo.org/glsa/200607-09","reference_id":"GLSA-200607-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200607-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0602","reference_id":"RHSA-2006:0602","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0602"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78207?format=json","purl":"pkg:ebuild/net-analyzer/ethereal@0.99.2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/ethereal@0.99.2"}],"aliases":["CVE-2006-3630"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mjse-ctbf-4yhk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50381?format=json","vulnerability_id":"VCID-y2cv-upke-wbg4","summary":"Wireshark (formerly known as Ethereal) is vulnerable to several security\n    issues, potentially allowing the execution of arbitrary code by a remote\n    attacker.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3631.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3631.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3631","reference_id":"","reference_type":"","scores":[{"value":"0.018","scoring_system":"epss","scoring_elements":"0.82719","published_at":"2026-04-01T12:55:00Z"},{"value":"0.018","scoring_system":"epss","scoring_elements":"0.82735","published_at":"2026-04-02T12:55:00Z"},{"value":"0.018","scoring_system":"epss","scoring_elements":"0.82748","published_at":"2026-04-04T12:55:00Z"},{"value":"0.018","scoring_system":"epss","scoring_elements":"0.82745","published_at":"2026-04-07T12:55:00Z"},{"value":"0.018","scoring_system":"epss","scoring_elements":"0.82771","published_at":"2026-04-08T12:55:00Z"},{"value":"0.018","scoring_system":"epss","scoring_elements":"0.82778","published_at":"2026-04-09T12:55:00Z"},{"value":"0.018","scoring_system":"epss","scoring_elements":"0.82794","published_at":"2026-04-11T12:55:00Z"},{"value":"0.018","scoring_system":"epss","scoring_elements":"0.82789","published_at":"2026-04-12T12:55:00Z"},{"value":"0.018","scoring_system":"epss","scoring_elements":"0.82784","published_at":"2026-04-13T12:55:00Z"},{"value":"0.018","scoring_system":"epss","scoring_elements":"0.82824","published_at":"2026-04-16T12:55:00Z"},{"value":"0.018","scoring_system":"epss","scoring_elements":"0.82823","published_at":"2026-04-18T12:55:00Z"},{"value":"0.018","scoring_system":"epss","scoring_elements":"0.82826","published_at":"2026-04-21T12:55:00Z"},{"value":"0.018","scoring_system":"epss","scoring_elements":"0.82849","published_at":"2026-04-24T12:55:00Z"},{"value":"0.018","scoring_system":"epss","scoring_elements":"0.82858","published_at":"2026-04-26T12:55:00Z"},{"value":"0.018","scoring_system":"epss","scoring_elements":"0.82862","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3631"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3631","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3631"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618150","reference_id":"1618150","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618150"},{"reference_url":"https://security.gentoo.org/glsa/200607-09","reference_id":"GLSA-200607-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200607-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0602","reference_id":"RHSA-2006:0602","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0602"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78207?format=json","purl":"pkg:ebuild/net-analyzer/ethereal@0.99.2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/ethereal@0.99.2"}],"aliases":["CVE-2006-3631"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y2cv-upke-wbg4"}],"fixing_vulnerabilities":[],"risk_score":"0.1","resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/ethereal@0.99.0-r1"}